Online Celebrity Searches that Could Land You in Hot Water

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Online Celebrity Searches that Could Land You in Hot Water-4 Next

Mad for Movies

Though no movie stars made the top 10 this year, several can be “scene” in the top 30, including: Antonio Banderas (No. 14), Nicole Kidman (No. 15), Zac Efron (No. 17), Natalie Portman (No. 18), Sandra Bullock (No. 19), Jennifer Lawrence (No. 20), Kate Mara (No. 22), Penelope Cruz (No. 27), Rooney Mara (No. 28), Scarlett Johansson, Jessica Alba, and Naomi Watts (tied at No. 29).

Wanting to know the latest dish on your favorite celebrity can be a pretty big lure. Do a quick search and -- boom -- tons of links with the latest news, gossip and goings on. Unfortunately, cyber criminals are well aware of our love for all things celebrity and are more than happy to set up malicious sites that will further their cause, whether it is to spread malware or find an access point to an otherwise well-secured enterprise network.

Intel Security recently released its list of the top 10 most dangerous cyber celebrities for 2015. This year, electronic dance music (EDM) DJ Armin Van Buuren replaced Jimmy Kimmel as the no. 1 most dangerous online celebrity. Their research found that clicking on results generated by searching for “Armin van Buuren” combined with the terms "free MP4,” “HD downloads,” or “torrent” yields almost a 1 in 5 chance of landing on a website that has tested positive for online threats, such as spyware, adware, spam, phishing, viruses and other malware.

To protect critical business assets, it's important to educate users about the dangers of online searches, especially for celebrities, and provide them with tips on how to better protect themselves and the company. In this slideshow, we've featured Intel Security's 10 most dangerous celebrities as well as tips on how users can better protect themselves.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.